Exam 8: Securing Information Systems
Exam 1: Information Systems in Global Business Today90 Questions
Exam 2: Global E-Business and Collaboration90 Questions
Exam 3: Information Systems, Organizations, and Strategy90 Questions
Exam 4: Ethical and Social Issues in Information Systems90 Questions
Exam 5: IT Infrastructure and Emerging Technologies90 Questions
Exam 6: Foundations of Business Intelligence: Databases and Information Management90 Questions
Exam 7: Telecommunications, the Internet, and Wireless Technology90 Questions
Exam 8: Securing Information Systems90 Questions
Exam 9: Achieving Operational Excellence and Customer Intimacy: Enterprise Applications90 Questions
Exam 10: E-Commerce: Digital Markets, Digital Goods90 Questions
Exam 11: Managing Knowledge90 Questions
Exam 12: Enhancing Decision Making89 Questions
Exam 13: Building Information Systems90 Questions
Exam 14: Managing Projects90 Questions
Exam 15: Managing Global Systems90 Questions
Select questions type
Biometric authentication is the use of physical characteristics such as retinal images to provide identification.
(True/False)
4.9/5
(25)
________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems.
(Multiple Choice)
4.9/5
(38)
Which of the following is not one of the main firewall screening techniques?
(Multiple Choice)
4.9/5
(37)
High-availability computing is also referred to as fault tolerance.
(True/False)
4.8/5
(35)
An independent computer program that copies itself from one computer to another over a network is called a
(Multiple Choice)
4.8/5
(33)
How can a firm's security policies contribute and relate to the six main business objectives? Give examples.
(Essay)
4.9/5
(40)
Which of the following statements about the Internet security is not true?
(Multiple Choice)
4.9/5
(34)
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called
(Multiple Choice)
4.9/5
(36)
________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.
(Short Answer)
4.8/5
(25)
Smaller firms may outsource some or many security functions to
(Multiple Choice)
4.9/5
(44)
You have just been hired as a security consultant by MegaMalls Inc., a national chain of retail malls, to make sure that the security of their information systems is up to par. Outline the steps you will take to achieve this.
(Essay)
4.8/5
(40)
Approximately how many new threats from malware were detected by Internet security firms in 2012?
(Multiple Choice)
4.8/5
(35)
Inputting data into a poorly programmed Web form in order to disrupt a company's systems and networks is called
(Multiple Choice)
4.7/5
(39)
In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.
(Multiple Choice)
4.9/5
(40)
How is the security of a firm's information system and data affected by its people, organization, and technology? Is the contribution of one of these dimensions any more important than the other? Why?
(Essay)
4.8/5
(32)
Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that
(Multiple Choice)
4.8/5
(42)
Showing 41 - 60 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)